CVE-2019-1349

NameCVE-2019-1349
DescriptionA remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2059-1, DSA-4581-1
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
git (PTS)stretch1:2.11.0-3+deb9u5fixed
stretch (security)1:2.11.0-3+deb9u7fixed
buster, buster (security)1:2.20.1-2+deb10u3fixed
bullseye, sid1:2.27.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gitsource(unstable)1:2.24.0-2
gitsourcebuster1:2.20.1-2+deb10u1DSA-4581-1
gitsourcejessie1:2.1.4-2.1+deb8u8DLA-2059-1
gitsourcestretch1:2.11.0-3+deb9u5DSA-4581-1

Notes

https://git.kernel.org/pub/scm/git/git.git/commit/?id=0060fd1511b94c918928fa3708f69a3f33895a4a
https://www.openwall.com/lists/oss-security/2019/12/13/1

Search for package or bug name: Reporting problems